Essays about: "Computer Network Security."
Showing result 26 - 30 of 117 essays containing the words Computer Network Security..
-
26. Automated Gait Analysis : Using Deep Metric Learning
University essay from Linköpings universitet/Medie- och Informationsteknik; Linköpings universitet/Tekniska fakultetenAbstract : Sectors of security, safety, and defence require methods for identifying people on the individual level. Automation of these tasks has the potential of outperforming manual labor, as well as relieving workloads. READ MORE
-
27. Investigation of dynamic control ML algorithms on existing and future Arm microNPU systems
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In this thesis, dynamically controlled machine learning algorithms running on state of the art Arm microNPUs, with an attached Cortex-M CPU, were investigated. The machine learning framework used was Tensorflow and different subsets of it, such as Tensorflow Lite micro. READ MORE
-
28. Combining Anomaly- and Signaturebased Algorithms for IntrusionDetection in CAN-bus : A suggested approach for building precise and adaptiveintrusion detection systems to controller area networks
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : With the digitalization and the ever more computerization of personal vehicles, new attack surfaces are introduced, challenging the security of the in-vehicle network. There is never such a thing as fully securing any computer system, nor learning all the methods of attack in order to prevent a break-in into a system. READ MORE
-
29. Formal verification of device driver monitors in HOL 4
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As computer systems become more ubiquitous in society the negative consequences of security holes and bugs in software and hardware grow larger. In theory, the optimal way to ensure that no such possibilites exists is to conduct formal proofs that the system behaves as it should and that it is incapable of performing unintended side-effects. READ MORE
-
30. Investigation on how presentation attack detection can be used to increase security for face recognition as biometric identification : Improvements on traditional locking system
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : Biometric identification has already been applied to society today, as today’s mobile phones use fingerprints and other methods like iris and the face itself. With growth for technologies like computer vision, the Internet of Things, Artificial Intelligence, The use of face recognition as a biometric identification on ordinary doors has become increasingly common. READ MORE